Feeds

Spyware scumbags make $2bn a year

Cash from chaos

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

Spyware ­ invasive programs that generate pop-ups, hijack home pages, redirect searches and poison DNS files ­ generates an estimated $2bn in revenue a year1, according to a study by anti-spyware firm Webroot. It estimates the surreptitious spyware and adware market "may be approaching 25 per cent" of the already-established market of online advertising.

As we've noted before, it's hard to square Webroot's $2n estimate with the observable size of adware market. Webroot's This calculation assumes a uniform distribution of spyware, among other statistical sins. Estimates on the damage caused by computer viruses are a notoriously inexact science. The same seems to apply to looking at the adware market.

SpyAudit

In the first quarter of 2005, 88 per cent of scans using Webroot's SpyAudit software found some form of unwanted program (Trojan, system monitor, cookie or adware) on consumer computers. The vast majority of corporate PCs (87 per cent) also harboured undesirable programs or cookies. Excluding cookies, more than 55 per cent of corporate PCs contained unwanted programs. Infested consumer PCs contained an average of 7.2 non-cookie infections.

Cookies annoy some people but they are nowhere near as serious a problem as key=logging or Trojan horse programs. System monitor (key logger programs) were found in seven per cent of consumer and enterprise PCs scanned using Webroot's software, down from 19 per cent in Q4 2004. Trojan horse programs were found on 19 per cent of consumer PCs and seven per cent of enterprise PCs, unchanged from Q4 2004.

Consumer sites 'riddled' with spyware

Webroot's data comes from analysis of stats from Webroot's consumer and corporate SpyAudit tools and from online research culled by Phileas, Webroot's automated spyware research system. Contrary to the perceived wisdom that spyware comes only from a limited number of dodgy online porn and warez sites, Phileas identified 4,294 sites (with almost 90,000 pages) containing some form of spyware.

Webroot's State of Spyware report names and shames the top ten most significant emerging spyware and adware threats based on detection, as well as potential impact. CoolWebSearch, an infamous piece of adware with over 100 different variants, was dubbed the top threat. GAIN and 180search Assistant were the next two most prevalent nuisances. ®

1 Webroot's figure for the value of the spyware market comes from multiplying the average number of pieces of adware per machines (4.38 - according to Webroot) times the number of active users on the net (290m - according to Nielsen Netratings) times the value of each adware installation per year ($2.25 - a figure derived Claria's filing that it made $90m a year from 40m "users").

Related links

Webroot's State of Spyware report (registration required)

Related stories

Adware-infected PCs net slimeware firms $3 a pop
Anti-spyware group collapses
Drive-by Trojans exploit browser flaws

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.